Outline event monitoring and detection, stating the purpose of each. Explain response and recovery, and describe their importance from your current perspective.
Security Operations Program Scenario: After the security team investigation of the Petya ransomware attack, it is determined that several critical security patches were missing from the CFO’s computer that led to the infection. Furthermore, the ransomware spread across the network to other connected systems, including the servers that manage online credit card transactions and personal […]